Anúncio

Cyber security

30 de Mar de 2019
Anúncio

Mais conteúdo relacionado

Similar a Cyber security(20)

Anúncio

Cyber security

  1. Cyber Security “ Before leaving the scene, clear your desk and your screen ”
  2. Introduction “ Control + Alt + Delete when you leave your seat ”
  3. What is Cyber Security ? Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks. “ Don’t let your trash become someone else’s treasure. Feed your shredder often. ”
  4. Let’s Talk About It  Cyber security standards are security standards which enable organisations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber-security is both about the insecurity created through cyberspace and about the technical and non-technical practices of making it more secure.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
  5. What is Cyber Crime Cyber Crime can be defined as offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth /SMS/MMS) Cybercrime may threaten a person or a nation’s security and financial health. Issues surrounding these types of crimes have become high- profile, particularly those surrounding hacking, copyright infringement, unwarranted mass- surveillance, sextortion, child pornography and child grooming There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise.
  6. Common Cyber Threats You can simply impress your audience and add a unique zing and appeal to your Presentations. Email Account Takeover You can simply impress your audience and add a unique zing and appeal to your Presentations. Phishing You can simply impress your audience and add a unique zing and appeal to your Presentations. Call Forwarding & Credential Replay You can simply impress your audience and add a unique zing and appeal to your Presentations. Malware You can simply impress your audience and add a unique zing and appeal to your Presentations. Spoofing
  7. How to create a shield ? Schwab’s internal Information Security Program :  Internal controls and training Advanced Technology :  Advanced encryption technology  Scans for suspicious behaviour  Schwab Mobile App ` Internal Security Advance Technology Information Security Information Security Controls :  Passwords  Schwab Security Tokens  Biometric identity verification through Voice ID
  8. Alert Safety Security  Using stolen Social Security numbers for employment or other gain – filing a false tax return – impersonating another person Identity Theft  Social Security numbers  Usernames  Date of birth  Passwords  Credit card numbers  Account numbers  Employment information  Checks Personal Data Stolen  Fraudulent Transactions – trading – electronic funds or wire transfers – account opening Resulting Crimes How Cyber Criminals use stolen data Identity theft is currently a gold mine for cybercriminals—one that reached an all- time high in 2016, with up to $16 billion worth of losses caused by fraud and identity theft. Most people are already aware that theft can happen due to high visibility cases that occurred during the past couple of years, like the attack on Yahoo during latter half of 2016. While identity theft should be concerning in itself, the real, tangible damage usually comes after, when an attacker uses the stolen information for malicious purposes.
  9. Security is everyone’s responsibility Add Text Easy to change colors, photos and Text. Add Text Easy to change colors, photos and Text. Add Text Easy to change colors, photos and Text. Add Text Easy to change colors, photos and Text. A successful cyber security approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defence from cyber attacks
  10. Additional security practices and behaviours You can simply impress your audience and add a unique zing and appeal to your Presentations. Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this Template will your Time, Money and Reputation. Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this Template will your Time, Money and Reputation.
  11. Let’s Talk About It… Architechtu- re Here the firewall is inspecting all traffics coming in and out from the internet via various servers connected to it. We’ll provide a highlight on these three major medias. Delivery Channel Connectio- ns Legacy Gateway Security Implementation “SEC_RITY is not complete without U!”
  12. A tremendous amount of security knowledge is unstructured -- created by humans, for humans -- making it inaccessible to traditional systems. ... In this short demo, Watson for Cyber Security helps a security analyst investigate a particular incident to uncover new patterns and security context never before seen. As cyberattacks grow in volume and complexity, artificial intelligence (AI) is helping under-resourced security operations analysts stay ahead of threats. Curating threat intelligence from millions of research papers, blogs and news stories, AI provides instant insights to help you fight through the noise of thousands of daily alerts, drastically reducing response times. AI technologies like machine learning and natural language processing enable analysts to respond to threats with greater confidence and speed. Watson for Cyber SecurityAI for Cyber Security “ Protect personal information. The identity saved could be your own ”
  13. Who Could Be An ATTACKER ? Governments attempting to use AI to establish hegemony, control people, or take down other governments. Corporations trying to achieve monopoly, destroying the competition through illegal means. Militaries developing cyber- weapons and robot soldiers to achieve dominance. 01 03 05 Doomsday cults attempting to bring the end of the world by any means. Criminals attempting to develop proxy systems to avoid risk and responsibility. Hackers attempting to steal information, resources or destroy cyberinfrastructure targets. 02 04 06
  14. of Cyber Security Advantages Block Unwanted Traffic : Help free up bandwidth for legitimate business traffic Reduce cost : Eliminate the need to buy and manage premises-based security devices and appliances. Buy What You Need : Pay-as-You_ Go service let you scale the solution easily as your organization grows. Always On : Proactive security keeps you ahead of threats and changing conditions to stay in control. Benefits : IT security solutions are essential for all kinds of businesses, particularly when you think about how important the internet and your digital systems are for your day-to-day operations. In 2017, more than 46% of UK businesses suffered a cyber-attack (Cyber security breaches survey 2017) of some sort, and without the very best in cyber security solutions, many of these businesses have suffered as a result, with decreased customer trust and even the actual theft of personal information.
  15. Reporting Cyber Crime Victim Support NFIB Alerts What to do?  If you or someone else is in immediate danger or risk of harm dial 999 now.  If you are suffering a live cyber attack that is in progress, call now on 0300 123 2040 to report, do not report using the online tool. This service is available 24 hours a day, 7 days a week for businesses, charities and organisations. Our advisors are also available 24/7 on web chat if you have any questions - http://www.actionfraud.police.uk/report-a-fraud- including-online-crime Victim Support Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors, photos and Text. National Fraud Intelligence Bureau Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors, photos and Text. Alerts Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors, photos and Text. Law Enforcement Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors, photos and Text. Law Enforcement
  16. Thank You “ Think before you click ” Security
Anúncio